Which of the follow...
 
Notifications
Clear all

Which of the following is the BEST example of the level of sophistication this threat actor is using?

1 Posts
1 Users
0 Likes
154 Views
 Tuan
(@shippertuan)
Noble Member
Joined: 2 years ago
Posts: 713
Topic starter  

A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets.

Which of the following is the BEST example of the level of sophistication this threat actor is using?

  • A . Social media accounts attributed to the threat actor
  • B . Custom malware attributed to the threat actor from prior attacks
  • C . Email addresses and phone numbers tied to the threat actor
  • D . Network assets used in previous attacks attributed to the threat actor
  • E . IP addresses used by the threat actor for command and control

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: